CN108270567A - Informed source verification method, device and system and message method and device - Google Patents

Informed source verification method, device and system and message method and device Download PDF

Info

Publication number
CN108270567A
CN108270567A CN201611261592.8A CN201611261592A CN108270567A CN 108270567 A CN108270567 A CN 108270567A CN 201611261592 A CN201611261592 A CN 201611261592A CN 108270567 A CN108270567 A CN 108270567A
Authority
CN
China
Prior art keywords
message
notification message
public key
informed source
signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611261592.8A
Other languages
Chinese (zh)
Other versions
CN108270567B (en
Inventor
王康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201611261592.8A priority Critical patent/CN108270567B/en
Publication of CN108270567A publication Critical patent/CN108270567A/en
Application granted granted Critical
Publication of CN108270567B publication Critical patent/CN108270567B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the present application provides a kind of informed source verification method and device, the method includes:Obtain notification message to be verified;Notification message includes message content and real messages are signed, Target Public Key certificate used by the informed source of acquisition message content instruction, it is signed using the standard message of Target Public Key certificates constructing message content, judge that the real messages signature of notification message to be verified is consistent with standard message signature, then the informed source that acknowledgement notification informed source is indicated in message content.The application can identify the credibility of the informed source of notification message, reduce the risk to cause any property loss due to user is difficult to forgery, counterfeit informed source.

Description

Informed source verification method, device and system and message method and device
Technical field
This application involves communication technique fields, are tested more particularly to a kind of informed source verification method and a kind of informed source Card device and, a kind of message method and a kind of message sending device and, a kind of interactive interface providing method and one Kind interactive device and a kind of informed source verification system.
Background technology
At present, user often receives the notification message of the diversified forms such as short message, mail, instant communication information.Usually User can judge whether the notification message can trust according to the informed source that notification message is claimed.For example, user will be considered that Mail header is credible for the mail of certain banking institution, alternatively, user will be considered that telephone number is public number of certain official mission The short message of code is credible.
However in real life, the telephone number of official mission is forged by pseudo-base station there is originator under malicious messages The SMS comprising swindle content is issued to user or calls oneself certain official mission, and the postal for including false content is sent to user Part.User may think that the notification message from official can trust after above-mentioned notification message is received, thus press According to the instruction of message content, bank transfer, the operation for ordering low-quality goods etc are performed, so as to cause property loss.
Therefore, because the informed source of notification message may be forged with it is counterfeit, user is difficult to informed source The true and false, so as to which there is the risks of property loss.
Invention content
The embodiment of the present application is come the technical problem to be solved is that a kind of informed source verification method of offer and a kind of message Source verify device and, a kind of message method and a kind of message sending device, a kind of interactive interface providing method and one kind Interactive device and a kind of informed source verification system.
To solve the above-mentioned problems, this application provides a kind of informed source verification method, the method includes:
Obtain notification message to be verified;The notification message includes message content and real messages are signed;
Obtain Target Public Key certificate used by the informed source of message content instruction;
It is signed using the standard message of message content described in the Target Public Key certificates constructing;
Judge that the real messages signature of the notification message to be verified is consistent with standard message signature, then confirm described logical Know the informed source that informed source is indicated in the message content.
Optionally, the message content carries the source identification of informed source, described to obtain what the message content indicated Include the step of Target Public Key certificate used by informed source:
The source identification of informed source is extracted from the message content;
According to the source identification, the Target Public Key certificate that the informed source uses is searched.
Optionally, it is described according to the source identification, the step of searching the Target Public Key certificate that the informed source uses Including:
Certificate issuance platform used by the informed source is determined according to the source identification;
The Target Public Key certificate used by the informed source described in identified certificate issuance platform request.
Optionally, it is described according to the source identification, the step of searching the Target Public Key certificate that the informed source uses Including:
In the multiple public key certificate to prestore, the public key certificate for being matched with the source identification is searched as Target Public Key card Book.
Optionally, the step of standard message using message content described in the Target Public Key certificates constructing is signed is wrapped It includes:
The hashed value of the message content is calculated using the Target Public Key certificate;
The hashed value is compressed into the character string using setting character format, and obtained character string will be compressed as mark Quasi- information signature.
Optionally, the character string hashed value being compressed into using setting character format, and will compress what is obtained The step of character string is signed as standard message includes:
The hashed value is compressed into multiple character strings according to different reduced rules;
The target string conduct being made of the conventional characters of the setting character format is filtered out from multiple character strings Standard message is signed.
Optionally, described the step of obtaining notification message to be verified, includes:
It monitors setting position and whether there is newly added notification message;The setting position includes answering for duplication operation The memory space of object processed;
If there are the notification message added in set period of time, the notification message is extracted from the memory space.
Optionally, the step of monitoring setting position whether there is newly added notification message includes:
Monitor the data content newly replicated in the memory space;
By identifying that the data content meets setting message format or including setting keyword, the data content is judged For notification message.
Optionally, described the step of obtaining notification message to be verified, includes:
The notification message that destination client receives is monitored, the destination client includes instant communication client, non-instant Telecommunication customer end, the non-instant telecommunication customer end include social client, mailbox or short message.
Optionally, the method further includes:
Judge that the notification message listened to meets setting message format or including setting keyword.
Optionally, before the step of monitoring setting position whether there is newly added notification message, the method It further includes:
According to user behavior trigger snoop-operations, the user behavior include by set interface open monitor function or Open client residing for snoop-operations.
Optionally, before described the step of obtaining notification message to be verified, the method further includes:
Displaying verification interface, the verification interface include the input frame of notification message;
Described the step of obtaining notification message to be verified, includes:
Receive the notification message that user inputs in the input frame at the verification interface.
Optionally, the method further includes:
Generation confirms first prompt message of the notification message from the informed source of message content instruction.
Optionally, first prompt message includes following at least one:Informed source verification result, disappears at message content Cease signature, source identification, Target Public Key certificate, validity period of certificate, certificate issuance platform.
Optionally, the method further includes:
When standard message signature and real messages signature are inconsistent, then generate and confirm the notification message simultaneously non-sourcing In the second prompt message of the informed source of message content instruction.
Optionally, the method further includes:
Corresponding storage is carried out with the source identification of the informed source to the Target Public Key certificate.
To solve the above-mentioned problems, present invention also provides a kind of message method, the method includes:
Target Public Key certificate is obtained according to the informed source marked in message content to be sent;
It is signed using the real messages of message content described in Target Public Key certificates constructing;
Using the message content and real messages signature generation notification message;
The notification message is issued, notification message is obtained, and obtaining in the message for informed source verification client Target Public Key certificate used by the informed source of appearance instruction, using the mark of message content described in the Target Public Key certificates constructing Quasi- information signature after judging that the real messages signature of the notification message is consistent with standard message signature, confirms that the notice disappears Breath is from the informed source of message content instruction.
Optionally, the message content carries the source identification of informed source, described according in message content to be sent The step of informed source acquisition Target Public Key certificate of label, includes:
Certificate issuance platform used by the informed source is determined according to the source identification;
The Target Public Key certificate used by the informed source described in identified certificate issuance platform request.
Optionally, the step of real messages using message content described in Target Public Key certificates constructing are signed includes:
The hashed value of the message content is calculated using the Target Public Key certificate;
The hashed value is compressed into the character string using setting character format, and obtained character string will be compressed as real Border information signature.
Optionally, the character string hashed value being compressed into using setting character format, and will compress what is obtained The step of character string is signed as real messages includes:
The hashed value is compressed into multiple character strings according to different reduced rules;
The target string conduct being made of the conventional characters of the setting character format is filtered out from multiple character strings Real messages are signed.
To solve the above-mentioned problems, present invention also provides a kind of informed source verification method, the method includes:
Displaying verification interface, the verification interface include the input frame of notification message;
Receive the notification message that user inputs in the input frame at the verification interface;The notification message is included in message Hold and real messages are signed;
Obtain Target Public Key certificate used by the informed source of message content instruction;
It is signed using the standard message of message content described in the Target Public Key certificates constructing;
Judge that the real messages signature of the notification message to be verified is consistent with standard message signature, then confirm described logical Know the informed source that informed source is indicated in the message content.
To solve the above-mentioned problems, present invention also provides a kind of interactive interface providing method, the method includes:
Displaying verification interface, the verification interface include the input frame of notification message;
Receive the notification message that user inputs in the input frame at the verification interface;The notification message is included in message Hold and real messages are signed;
Obtain Target Public Key certificate used by the informed source of message content instruction;
It is signed using the standard message of message content described in the Target Public Key certificates constructing;
Judge that the real messages signature of the notification message to be verified is consistent with standard message signature, then confirm described logical Know the informed source that informed source is indicated in the message content;
In verification the first prompt message of showing interface, first prompt message is used to confirm that the notification message derives from The informed source of the message content instruction.
To solve the above-mentioned problems, disclosed herein as well is a kind of informed sources to verify device, and described device includes:
Notification message acquisition module, for obtaining notification message to be verified;The notification message include message content and Real messages are signed.
Target Public Key certificate acquisition module, for obtaining the informed source of message content instruction used by target it is public Key certificate.
Standard message signature generation module, for being disappeared using the standard of message content described in the Target Public Key certificates constructing Breath signature.
Determination module, for judging the real messages of the notification message to be verified signature and standard message signature one It causes, then confirms that the notification message derives from the informed source of message content instruction.
Optionally, the message content carries the source identification of informed source, the Target Public Key certificate acquisition module packet It includes:
Source identification extracting sub-module, for extracting the source identification of informed source from the message content;
Target Public Key certificate lookup submodule, for according to the source identification, searching the mesh that the informed source uses Mark public key certificate.
Optionally, the Target Public Key certificate lookup submodule includes:
Certificate issuance platform determination subelement, for determining the informed source according to the source identification used by demonstrate,prove Bookmark sends out platform;
Target Public Key certificate request subelement, for being adopted from informed source described in identified certificate issuance platform request Target Public Key certificate.
Optionally, the Target Public Key certificate lookup submodule includes:
Public key certificate searches subelement, in the multiple public key certificate to prestore, lookup to be matched with the source identification Public key certificate as Target Public Key certificate.
Optionally, the standard message signature generation module includes:
First hashed value computational submodule, for calculating the hash of the message content using the Target Public Key certificate Value;
First hashed value compresses submodule, for the hashed value to be compressed into the character string using setting character format, And it signs obtained character string is compressed as standard message.
Optionally, the first hashed value compression submodule includes:
First hashed value compresses subelement, for the hashed value to be compressed into multiple characters according to different reduced rules String;
First conventional characters screen subelement, for being filtered out from multiple character strings by the normal of the setting character format It signs by the use of the target string that character forms as standard message.
Optionally, the notification message acquisition module includes:
Submodule is monitored in setting position, for monitoring setting position with the presence or absence of newly added notification message;The setting Position includes the memory space for the duplication object for replicating operation;
Notification message extracting sub-module, if for there are the notification messages added in set period of time, it is empty from the storage Between extract the notification message.
Optionally, the setting position is monitored submodule and is included:
Data content monitors subelement, for monitoring the data content newly replicated in the memory space;
Data content identification subelement identifies that the data content meets setting message format or including setting for passing through Keyword judges the data content for notification message.
Optionally, the notification message acquisition module includes:
Submodule is monitored in destination client, for monitoring the notification message of destination client reception, the destination client Including instant communication client, non-instant telecommunication customer end, the non-instant telecommunication customer end include social client, mailbox or Short message.
Optionally, described device further includes:
Notification message determination module, for judging that the notification message listened to meets setting message format or including setting pass Keyword.
Optionally, described device further includes:
Snoop-operations trigger module, for triggering snoop-operations according to user behavior, the user behavior is included by setting Stationary interface opens monitor function or opens client residing for snoop-operations.
Optionally, described device further includes:
Showing interface module verifies interface for showing, the verification interface includes the input frame of notification message;
The notification message acquisition module includes:
Notification message receiving submodule disappears for receiving the notice that user inputs in the input frame at the verification interface Breath.
Optionally, described device further includes:
First prompt message generation module confirms the notification message from message content instruction for generating First prompt message of informed source.
Optionally, first prompt message includes following at least one:Informed source verification result, disappears at message content Cease signature, source identification, Target Public Key certificate, validity period of certificate, certificate issuance platform.
Optionally, described device further includes:
Second prompt message generation module, it is inconsistent for working as the standard message signature and real messages signature, then it gives birth to The second prompt message of the informed source of the message content instruction is not originating from into the confirmation notification message.
Optionally, described device further includes:
Corresponding memory module, for carrying out corresponding deposit with the source identification of the informed source to the Target Public Key certificate Storage.
To solve the above-mentioned problems, disclosed herein as well is a kind of message sending device, described device includes:
Target Public Key certificate acquisition module, for obtaining target according to the informed source marked in message content to be sent Public key certificate;
Real messages signature generation module, for using the real messages label of message content described in Target Public Key certificates constructing Name;
Notification message generation module, for using the message content and real messages signature generation notification message;
Notification message sending module for issuing the notification message, obtains logical for informed source verification client Message, and the Target Public Key certificate used by the informed source for obtaining the message content instruction are known, using target public affairs The standard message signature of message content described in key certificates constructing judges the real messages signature and standard message of the notification message After signature is consistent, confirm that the notification message derives from the informed source of message content instruction.
Optionally, the message content can carry the source identification of informed source, the Target Public Key certificate acquisition mould Block includes following submodule:
Certificate issuance platform determination sub-module, for determining the informed source according to the source identification used by demonstrate,prove Bookmark sends out platform.
Target Public Key certificate request submodule, for being adopted from informed source described in identified certificate issuance platform request Target Public Key certificate.
Optionally, the real messages signature generation module includes following submodule:
Second hashed value computational submodule, for calculating the hash of the message content using the Target Public Key certificate Value.
Second hashed value compresses submodule, for the hashed value to be compressed into the character string using setting character format, And it signs obtained character string is compressed as real messages.
Optionally, the second hashed value compression submodule can include following subelement:
Second hashed value compresses subelement, for the hashed value to be compressed into multiple characters according to different reduced rules String;
Second conventional characters screen subelement, for being filtered out from multiple character strings by the normal of the setting character format It signs by the use of the target string that character forms as real messages.
To solve the above-mentioned problems, disclosed herein as well is a kind of informed sources to verify device, and described device includes:
Showing interface module verifies interface for showing, the verification interface includes the input frame of notification message;
Notification message receiving module, for receiving the notification message that user inputs in the input frame at the verification interface; The notification message includes message content and real messages are signed;
Target Public Key certificate acquisition module, for obtaining the informed source of message content instruction used by target it is public Key certificate;
Standard message signature generation module, for being disappeared using the standard of message content described in the Target Public Key certificates constructing Breath signature;
Determination module, for judging the real messages of the notification message to be verified signature and standard message signature one It causes, then confirms that the notification message derives from the informed source of message content instruction.
To solve the above-mentioned problems, disclosed herein as well is a kind of interactive device, the equipment includes:
Verify interface, input control and displaying control;
Wherein, for the displaying control for showing verification interface, the verification interface includes input control;
The input control is used to receive notification message input by user;The notification message includes message content and reality Information signature;
The interactive device is used for the Target Public Key certificate obtained according to the informed source that the message content indicates, Generate the standard message signature of the message content;And in the real messages signature and mark for judging the notification message to be verified When quasi- information signature is consistent, the first prompt message is generated;
The displaying control is additionally operable in verification the first prompt message of showing interface, and first prompt message is used to confirm The notification message derives from the informed source of message content instruction.
To solve the above-mentioned problems, disclosed herein as well is a kind of informed sources to verify system, and the system comprises message Source-verify client and certificate issuance platform;
The informed source verification client includes:
Notification message acquisition module, for obtaining notification message to be verified;The notification message include message content and Real messages are signed;
First object public key certificate acquisition module, for obtaining the informed source of message content instruction used by mesh Mark public key certificate;
Standard message signature generation module, for being disappeared using the standard of message content described in the Target Public Key certificates constructing Breath signature;
Determination module, for judging the real messages of the notification message to be verified signature and standard message signature one It causes, then confirms that the notification message derives from the informed source of message content instruction;
The certificate issuance platform includes:
First object public key certificate sending module, for sending Target Public Key card to informed source verification client Book.
Optionally, the system also includes:Destination client;The destination client includes instant communication client, non- Instant communication client, the non-instant telecommunication customer end include social client, mailbox or short message;
The destination client includes:
Notification message receiving module, for receiving notification message;
The notification message acquisition module, the notification message received specifically for monitoring destination client.
Optionally, the system also includes:Informed source end;
The informed source end includes:
Second Target Public Key certificate acquisition module, for being obtained according to the informed source marked in message content to be sent Target Public Key certificate;
Real messages signature generation module, for using the real messages label of message content described in Target Public Key certificates constructing Name;
Notification message generation module, for using the message content and real messages signature generation notification message;
Notification message sending module for issuing the notification message, obtains logical for informed source verification client Message, and the Target Public Key certificate used by the informed source for obtaining the message content instruction are known, using target public affairs The standard message signature of message content described in key certificates constructing judges the real messages signature and standard message of the notification message After signature is consistent, confirm that the notification message derives from the informed source of message content instruction;
The certificate issuance platform further includes:
Second Target Public Key certificate sending module, for sending Target Public Key certificate to the informed source end.
Compared with prior art, the embodiment of the present application includes advantages below:
According to the embodiment of the present application, the message indicated by message content in the notification message received for destination client Source obtains Target Public Key certificate, is signed according to Target Public Key certificates constructing standard message, passes through standard message signature and reality Whether the consistency acknowledgement notification message of information signature puts up a notice from the informed source indicated by message content so as to identify The credibility of the informed source of message is reduced and is caused any property loss due to user is difficult to forgery, counterfeit informed source Risk.
According to the embodiment of the present application, by the way that the public key certificate for corresponding to multiple informed sources is pre-stored in local so that When carrying out informed source verification for notification message, information exchange is carried out without with outside, is completed in destination client whole A verification process realizes the off-line verification to informed source.Pay no attention to so as to avoid because of no network connection or network speed The problem of informed source verification can not be carried out in the case of thinking, improves the flexibility of informed source verification.
According to the embodiment of the present application, the of the informed source indicated by generating acknowledgement notification informed source in message content One prompt message so that user can trust the notification message of unknown informed source according to prompt message, and user is avoided to miss weight The notification message wanted.Meanwhile by generate acknowledgement notification message be not originating from message content indicate informed source second Prompt message avoids user from causing any property loss due to forgery, counterfeit informed source.
According to the embodiment of the present application, by the way that the hashed value of message content to be compressed into the character string of setting character, thus will Digital signature is converted into character signature so that information signature is identified and remembered convenient for user.When carrying out informed source verification, use Family can directly input notification message to complete to verify, so that informed source verification, which need not depend on, is stored in target customer Notification message on end, avoid because user accidentally deletes notification message and the problem of can not verifying.Moreover, user can will include The notification message of confidential information is deleted immediately, and confidential information is avoided to reveal, and can be notified when needing verification by typewriting input The mode of message is completed to verify.
According to the embodiment of the present application, obtained by informed source end according to the informed source marked in message content to be sent Target Public Key certificate is taken, is signed using the real messages of message content described in Target Public Key certificates constructing, using in the message Hold and real messages signature generates notification message and issues so that informed source end can send to destination client and can test The notification message of informed source is demonstrate,proved, consequently facilitating the user for receiving notification message verifies informed source.
It secondly, can be by non intelligent, insincere, no during the informed source end notification message transmission of the embodiment of the present application It can verify that the channel in source is sent, while ensureing the integrality of notification message, not changing existing communication system, realize Verification to informed source.The notification message sent with short message mode is directed to, short message mode can be not only maintained and be had Some wide coverages, compatible terminal are more, assign fireballing advantage, and realize the verifiability of informed source.
Again, the embodiment of the present application can be multiplexed existing PKI and RSA (key certificate system) to realize that informed source is tested Card reduces the cost of implementation of informed source verification.
Meanwhile the embodiment of the present application can be applied to various instant communication clients and, it is social client, mailbox, short The non-instant telecommunication customer end of letter etc., it is achieved thereby that the informed source verification between individual subscriber.
Finally, the notification message issued by the embodiment of the present application can meet People's Republic of China's law of electronic signature Regulation ensures that issued notification message has legal effect using cryptography, convenient for user using the notification message of reception as Legal argument.
Description of the drawings
Fig. 1 is a kind of application scenario diagram of informed source verification of the embodiment of the present application one;
Fig. 2 is a kind of information exchange schematic diagram of informed source verification of the embodiment of the present application two;
Fig. 3 is a kind of step flow chart of informed source verification method of the embodiment of the present application three;
Fig. 4 is the step flow chart of another informed source verification method of the embodiment of the present application four;
Fig. 5 is a kind of step flow chart of message method of the embodiment of the present application five;
Fig. 6 is a kind of step flow chart of informed source verification method of the embodiment of the present application six;
Fig. 7 is a kind of step flow chart of interactive interface providing method of the embodiment of the present application seven;
Fig. 8 is a kind of structure diagram of informed source verification device of the embodiment of the present application eight;
Fig. 9 is the structure diagram of another informed source verification device of the embodiment of the present application nine;
Figure 10 is a kind of structure diagram of message sending device of the embodiment of the present application ten;
Figure 11 is a kind of structure diagram of informed source verification device of the embodiment of the present application 11;
Figure 12 is a kind of structure diagram of informed source verification system of the embodiment of the present application 12;
Figure 13 is that the destination client of the embodiment of the present application receives the schematic diagram of notification message;
Figure 14 is the schematic diagram one of first prompt message of the embodiment of the present application;
Figure 15 is the schematic diagram two of first prompt message of the embodiment of the present application.
Specific embodiment
Above-mentioned purpose, feature and advantage to enable the application are more obvious understandable, below in conjunction with the accompanying drawings and specific real Mode is applied to be described in further detail the application.
It should be noted that in practical notification message issues scene, the mobile terminals such as mobile phone, computer can be by each Instant communication client on another mobile terminal of class instant communication client and non-instant telecommunication customer end and non-instant Telecommunication customer end sends a notification message.Such as information of SMS, mail, social client publication etc..
Therefore, the instant communication client to send a notification message and non-instant telecommunication customer end can be issued as message Side, using receive notification message instant communication client and non-instant telecommunication customer end as user terminal.
However, notification message may be by the notification message for including swindle content that pseudo-base station issues, it is also possible to logical Cross the notification message for including false content that counterfeit official's number is issued.Disappear for the above-mentioned notice comprising fallacious message Breath, user are difficult to the true and false of informed source.
Embodiment one
Fig. 1 shows a kind of application scenario diagram of informed source verification of the embodiment of the present application one.It can be seen that at this In the information authentication scene for applying for embodiment, include originating party under message, user terminal, verification side and root certificate and sign and issue mechanism.
Wherein, the message side of issuing may be for credible base station, the message server of official mission or by message receiver institute The other users terminal of trust, it is also possible to which the pseudo-base station of the notification message comprising swindle, false content, other are insincere to issue User terminal etc. malicious messages under originating party.
Specifically, the message side of issuing can sign and issue one news release certificate of mechanism requests to root certificate, and root certificate is signed and issued Mechanism can return to corresponding news release certificate according to originating party under message.Originating party preserves the news release certificate under message, It, can be according to the news release certificate of preservation, in message when needing to issue some message content to some user terminal Hold and generate a real messages signature.The message side of issuing can add one in message content and be used to indicate coming for informed source Source identifies, and message content and real messages signature generation notification message are issued to user terminal.
User terminal after the notification message of originating party, can be obtained the notification message in the case where receiving message by verification side, and Verify whether the informed source that the notification message is claimed can trust.Wherein, verification can be with to install on the subscriber terminal Security verification software or some software on secure verification module, can also be external secure verification servers.
Specifically, verification side can sign and issue mechanism requests phase according to the informed source indicated by message content to root certificate The public key certificate answered, alternatively, searching the public key certificate corresponding to indicated informed source in the public key certificate to prestore.
It should be noted that news release certificate and verification Fang Sheng used by originating party generation real messages are signed under message The public key certificate signed into standard message can be identical certificate, or have the certificate of correspondence, such as message Root certificate is signed and issued news release certificate that mechanism issues as private key certificate by lower originating party, to generate real messages signature, and is tested Very side is using public key certificate corresponding with news release certificate generation standard message signature.Correspondingly, root certificate sign and issue mechanism can Preservation news release certificate and public key certificate are corresponded to be directed to originating party under each message, so that originating party under message and verification side obtain Corresponding certificate.
Verification side generates standard message signature using public key certificate for the message content received, and by the mark of generation Quasi- information signature is compared with the real messages signature in notification message, when the two is consistent, then notification message can be confirmed Derived from the informed source indicated by message content, when the two is inconsistent, then it can be confirmed that notification message is not originating from message Hold indicated informed source.Can return to corresponding prompt message to user terminal for different verification results, with to It prompts the notification message that can trust or prompts the notification message that may be imitated for base station forgery official's number or other users in family Emit the notification message transmitted by official mission.
In practical application, the message side of issuing can be with verification side using on identical security verification software, some software Secure verification module or secure verification servers, to realize that above-mentioned notification message issues processing and informed source verification processing. For example, when originating party is prepared to some user terminal transmission message content under message, the message side of issuing can call safety verification soft Message content is sent to secure verification servers by part or secure verification module on some software, security verification software, Secure verification module or secure verification servers on some software can be directed to originating party under current message and obtain public key certificate, And using the real messages signature of public key certificate generation message content obtained, by message content, real messages signature and message The mark of lower originating party is issued to user terminal.
The message side of issuing can also be tested from verification side using the safety on different security verification softwares, some software Card module or secure verification servers realize that above-mentioned notification message issues processing and informed source verification processing.Art technology Personnel can be realized above-mentioned according to the technical thought and actual conditions that the embodiment of the present application is provided using different business structures Informed source verification process.
Embodiment two
Fig. 2 shows the information exchange schematic diagrames that a kind of informed source of the embodiment of the present application two is verified.It can be seen that It is signed and issued by originating party, user terminal, verification side and root certificate under message and information exchange is carried out between mechanism to complete informed source Verification.
Specifically, root certificate, which signs and issues mechanism, to issue news release certificate by originating party under message, and originating party uses under message News release certificate signs to the message content that will be issued, and information signature is pressed by the way of Chinese character code Contracting, to shorten the length of information signature.Message content and information signature are formed notification message by originating party under message, use routine Notification message is sent to the user terminal by the channel of insincere, not verifiable informed source.For example, pass through base station, public network Channels is waited to send a notification message in a manner of SMS, mail, all kinds of instant communication informations to user terminal.
For user terminal after notified message, the notification message received can be affixed to the peace as verification side by user On the verification interface of full verification software, notification message is got for verification side.For notification message, verification side can disappear from notice Message body and information signature are split out in breath, is signed respectively as message content and real messages.Verification root is according to message content The informed source claimed signs and issues mechanism from root certificate and gets corresponding public key certificate, and obtain being directed to using public key certificate and disappear The signature value of the hashed value of content is ceased, is signed obtained signature value as standard message, with the real messages in notification message Signature is compared, and returns to corresponding message verification result to user terminal according to comparison result.
Embodiment three
Fig. 3 shows a kind of step flow chart of informed source verification method of the embodiment of the present application three, can specifically wrap Include following steps:
Step 301, notification message to be verified is obtained;The notification message includes message content and real messages are signed.
In practical application, the informed source end for sending a notification message is issuing some notice to some destination client It, can be according to the source identification at informed source end, from such as PKI (Public Key Infrastructure, public key base during message Infrastructure), that the certificate issuance platform of CA (Certificate Authority, authentication center) etc. gets corresponding target is public Key certificate.
In practical application, Target Public Key certificate can also be pre-stored in informed source end, need notification message transmission When locally obtain Target Public Key certificate.Message content to be issued is directed to, Target Public Key card may be used in informed source end The real messages of inteilectual into message content are signed, and by message content and real messages signature generation notification message, and are issued to mesh Mark client.
In the embodiment of the present application, it can verify that client obtains the notification message of destination client by informed source to make For notification message to be verified, so that the informed source to notification message is verified.Wherein, notification message can include message Content and real messages signature.
In practical application, informed source verification client can be split out by identifying the crucial words in notification message Message content and real messages signature in notification message.For example, for notification message "【Sender】Miss Wang, congratulate you into For double 11 the 100000000th payment users, we provide whole year for you and exempt from list.【Short message verification code】Saitama sucks saliva ", it can be according to keyword Word " Sender " and " short message verification code " split out message content "【Sender】Miss Wang, congratulating you becomes double 11 the 100000000th pairs Money user, we provide whole year for you and exempt from list " and real messages sign " Saitama sucks saliva ".
It should be noted that informed source verification client can be the peace on the destination client for receive notification message Full verification software, user can open verification application software to carry out verification processing.Informed source verifies that client may be One secure verification servers, the notification message of reception can be sent to authentication server by destination client, by the service for checking credentials Device completes verification processing.
In practical application, obtain notification message concrete mode can there are many, for example, user can start target customer Informed source verification client on end is monitored the notification message of destination client reception by informed source verification client;Or Person, user can replicate the notification message of reception, and paste notice on the verification interface of informed source verification client and disappear Breath, so that informed source verification client obtains notification message.Certainly, those skilled in the art can use according to actual conditions Various ways obtain notification message.
Step 302, Target Public Key certificate used by the informed source of message content instruction is obtained.
In the specific implementation, the source identification that can be marked in the message content that informed source end issues.Cause This, informed source verification client can obtain corresponding mesh according to the informed source indicated by source identification in message content Mark public key certificate.Obtain public key certificate mode can there are many, for example, can be to message indicated by certificate issuance platform request Requested public key certificate is back to informed source verification client by the public key certificate in source, certificate issuance platform;It or can The public key certificate of each informed source is pre-stored in informed source verification client, for needing when calls.
Step 303, it is signed using the standard message of message content described in the Target Public Key certificates constructing.
In the specific implementation, Target Public Key certificate may be used in informed source verification client, for message content generation one A standard message signature.Generate standard message signature mode can there are many, be directed to for example, Target Public Key certificate may be used The hash of message content is worth to a character string using setting character format, and using the character string as standard message label Name.
Step 304, judge that the real messages signature of the notification message to be verified is consistent with standard message signature, then really Recognize the informed source that the notification message derives from message content instruction.
In the specific implementation, informed source verification client may determine that the real messages signature and standard message of notification message The consistency of signature can be confirmed that notification message to be verified derives from the informed source of its instruction when consistent.Practical application In, according to the situation generation whether believable prompt message in confirmation message source is confirmed the prompting can be returned to destination client Whether information carries out corresponding operating with for reference according to the instruction of the notification message.
According to the embodiment of the present application, the message indicated by message content in the notification message received for destination client Source obtains Target Public Key certificate, is signed according to Target Public Key certificates constructing standard message, passes through standard message signature and reality Whether the consistency acknowledgement notification message of information signature puts up a notice from the informed source indicated by message content so as to identify The credibility of the informed source of message is reduced and is caused any property loss due to user is difficult to forgery, counterfeit informed source Risk.
Example IV
Fig. 4 shows the step flow chart of another informed source verification method of the embodiment of the present application four, specifically can be with Include the following steps:
Step 401, notification message to be verified is obtained;The notification message includes message content and real messages are signed.
Optionally, the step 401 can include following sub-step:
Sub-step S1 monitors setting position and whether there is newly added notification message;The setting position is included for multiple The memory space of the duplication object of system operation.
If there are the notification message added in set period of time, the notice is extracted from the memory space by sub-step S2 Message.
After receiving notification message in destination client, user can replicate using the notification message as object is replicated Operation, the notification message being replicated can be stored in specific memory space.
Therefore, the memory space that can be directed to duplication object is monitored.If the memory space is new in set period of time Added with notification message, show there is currently the notification message verified, this can be extracted from memory space and is newly added The notification message added, subsequently to carry out the verification of informed source.For example, user can be answered the short message that mobile phone receives System, the short message being replicated can be stored in short message storage hard disk, and it is hard that informed source verification client can monitor short message storage Disk, when short message storage hard disk within a certain period of time increase newly short message, then can obtain the short message to verify informed source.
According to the embodiment of the present application, monitored, realized to notification message by the notification message to setting position Automatic verification, saves user's operation.
Optionally, the sub-step S1 can include:
Sub-step S1-1 monitors the data content newly replicated in the memory space.
Sub-step S1-2, by identifying that the data content meets setting message format or including setting keyword, judgement The data content is notification message.
In practical application, and the not all content replicated by user is notification message, therefore can be to the content of monitoring It is screened.Specifically, the data content newly replicated in memory space can be monitored and be identified, when data content satisfaction is set Fixed message format or the keyword for including setting, it is possible to determine that the data content is notification message.For example, work as data Content includes the setting keyword of " notice ", " congratulating you to get the winning number in a bond " etc., it is possible to determine that data content is notification message.
Screening verification is carried out by the data content to monitoring, avoids getting non-notification message, saves process resource.
Optionally, the step 401 can include following sub-step:
Sub-step S3, monitors the notification message that destination client receives, and the destination client includes instant messaging client End, non-instant telecommunication customer end, the non-instant telecommunication customer end include social client, mailbox or short message.
It is monitored in the specific implementation, the notification message that destination client is received can be directed to, when destination client is worked as Before receive notification message and then obtain the notification message.Wherein, destination client can include instant communication client and, The non-instant telecommunication customer end of social client, mailbox, short message etc..For example, can monitor mailbox with the presence or absence of unread mail or Monitor whether social client newly receives the social information that other users are sent.
According to the embodiment of the present application, by monitoring the notification message that destination client receives, work as destination client Verification is triggered immediately after receiving notification message, is realized the automatic verification to notification message, is saved user's operation.
Optionally, the method can further include:
Judge that the notification message listened to meets setting message format or including setting keyword.
In practical application, the notification message that destination client is received not is required to be verified, therefore can be to prison The notification message listened is screened.Specifically, can be directed to the notification message that listens to whether meet setting message format or It is no to be judged comprising setting keyword, when notification message meets the message format of setting or includes the keyword of setting, The notification message can be obtained to verify informed source.For example, when notification message includes the setting of " congratulating you to get the winning number in a bond " etc. Keyword or notification message have more number of words, can obtain the notification message to verify.
By carrying out screening verification to the notification message listened to, avoid to not being related to user's property, information security is led to Know that message is verified, save process resource.
Optionally, before the sub-step S1, the method can further include:
According to user behavior trigger snoop-operations, the user behavior include by set interface open monitor function or Open client residing for snoop-operations.
User can carry out specific operation behavior to trigger snoop-operations on destination client.Specifically, can pass through Some setting interface is opened to monitor whether setting position newly connects with the presence or absence of newly added notification message or destination client The monitor function of notified message;Alternatively, some is opened for carrying out the client of snoop-operations, to pass through client reality Apply monitoring.The informed source verification client of installation on mobile terminals is directed to, informed source verification can be opened in user Snoop-operations are triggered during client, can also be touched after user's inbound message source-verify client by opening monitor function Send out snoop-operations.In practical application, informed source verification client can also keep monitoring, and to listening in running background Notification message verified, when user switch to informed source verification client when, verification result is showed into user.
Optionally, before the step 401, the method can further include:
Displaying verification interface, the verification interface include the input frame of notification message.
The step 401 can include following sub-step:
Sub-step S4 receives the notification message that user inputs in the input frame at the verification interface.
In the specific implementation, user opens informed source verification client, informed source verification client listens to user It replicates notification message or listens to destination client and newly receive notification message, informed source verification client can provide a user One verification interface, verification interface have the input frame of notification message.User can input the notice received in input frame Message.The mode of input can be during user pastes the notification message of duplication into input frame or user is using typewriting Mode the content of notification message is input in input frame one by one.Informed source verification client can will input in input frame Notification message obtain, to be verified.
Step 402, Target Public Key certificate used by the informed source of message content instruction is obtained.
Optionally, the message content carries the source identification of informed source, and the step 402 can include following sub-step Suddenly:
Sub-step S5 extracts the source identification of informed source from the message content.
Sub-step S6 according to the source identification, searches the Target Public Key certificate that the informed source uses.
It should be noted that informed source end when sending a notification message, can add the source identification corresponding to it Into message content to indicate the informed source of the notification message.Therefore, informed source verification client can be from message content Middle extraction source identification, and corresponding Target Public Key certificate is searched according to source identification.For example, can from "【Sender】King is small Elder sister, congratulating you becomes double 11 the 100000000th payment users, we provide whole year for you and exempt from list " message content in extraction source mark Know " Sender ", and search the Target Public Key certificate corresponding to " Sender ".
Optionally, the sub-step S6 can include:
Sub-step S6-1 determines certificate issuance platform used by the informed source according to the source identification.
Sub-step S6-2, Target Public Key is demonstrate,proved used by the informed source described in identified certificate issuance platform request Book.
The certificate notification message transmission that different certificate issuance platforms is issued may be used in informed source end.Specific implementation In, informed source verification client can determine certificate used by the informed source that informed source end indicates according to source identification Platform is signed and issued, and corresponds to the Target Public Key certificate of source identification to the certificate issuance platform request.
Optionally, the sub-step S6 can include:
Sub-step S6-3 in the multiple public key certificate to prestore, searches the public key certificate work for being matched with the source identification For Target Public Key certificate.
In practical application, it can will be pre-stored in informed source verification client corresponding to the public key certificate of multiple source identifications Or on destination client.The source identification of extraction is directed to, verifies that matching is searched in client or destination client in informed source Public key certificate as Target Public Key certificate.
Optionally, the method can further include:
Corresponding storage is carried out with the source identification of the informed source to the Target Public Key certificate.
In the specific implementation, after the Target Public Key certificate corresponding to source identification is got, it can be by itself and informed source Source identification correspond to storage.When subsequently being verified again for identical informed source, then it need not repeat to certificate issuance Platform request public key certificate saves the process resource of terminal.
According to the embodiment of the present application, by the way that the public key certificate for corresponding to multiple informed sources is pre-stored in local so that When carrying out informed source verification for notification message, information exchange is carried out without with outside, is completed in destination client whole A verification process realizes the off-line verification to informed source.Pay no attention to so as to avoid because of no network connection or network speed The problem of informed source verification can not be carried out in the case of thinking, improves the flexibility of informed source verification.
Step 403, it is signed using the standard message of message content described in the Target Public Key certificates constructing.
Optionally, the step 403 can include following sub-step:
Sub-step S7 calculates the hashed value of the message content using the Target Public Key certificate.
The hashed value is compressed into the character string using setting character format, and will compress obtained word by sub-step S8 Symbol string is signed as standard message.
In the specific implementation, Target Public Key certificate may be used, by such as MD5, (Message Digest Algorithm, disappear Cease digest algorithm the 5th edition), SHA-1 (Secure Hash Algorithm-1, secure hash algorithm -1), SHA-256 (safety Hashing algorithm -256) etc. message digest algorithm calculate the hashed value of the message content, hashed value is compressed into using setting The character string of character format, and sign obtained character string is compressed as standard message.For example, using public key certificate by " king Miss, congratulating you becomes double 11 the 100000000th payment users, we provide whole year for you and exempt from list " standard of generation Chinese character disappears Breath signature " Saitama sucks saliva ".
In practical application, various ways may be used, hashed value is compressed into setting character format.For example, by hashed value pressure When shortening Chinese character into, it can be compressed by way of telegraph code or region-position code.
Meanwhile the hashed value of message content is compressed into the character string of setting character so that relatively short information signature It can store with the information content of Base64 (coding mode of syllabified code) same levels, the storage for saving destination client is empty Between.
Optionally, the sub-step S8 can include:
The hashed value is compressed into multiple character strings by sub-step S8-1 according to different reduced rules;
Sub-step S8-2 filters out the target being made of the conventional characters of the setting character format from multiple character strings Character string is signed as standard message.
In the specific implementation, hashed value can be compressed according to multiple reduced rules, it is same to be mapped to Multiple character strings of message content search one or more character strings being made of conventional characters as mesh from multiple character strings Character string is marked, is signed by the target string as standard message.It is signed using conventional characters as standard message, further just It identifies and remembers in user.
Step 404, judge that the real messages signature of the notification message to be verified is consistent with standard message signature, then really Recognize the informed source that the notification message derives from message content instruction.
Step 405, generation confirms that the notification message is carried from the first of the informed source of message content instruction Show information.
Optionally, first prompt message includes following at least one:Informed source verification result, disappears at message content Cease signature, source identification, Target Public Key certificate, validity period of certificate, certificate issuance platform.
In the specific implementation, when the informed source that acknowledgement notification informed source is indicated in message content, can generate corresponding First prompt message can return to first prompt message to destination client, be shown from destination client to user.Wherein, First prompt message can include informed source verification result, message content, information signature, source identification, Target Public Key certificate, One or more information in validity period of certificate, certificate issuance platform.In practical application, can prompt message institute be selected by user The particular content of displaying, for example, the button for providing a detailed verification information of displaying is clicked for user, when user clicks the button Detailed verification information is then shown afterwards.
In practical application, user may and distrust the notification message of unknown informed source, however the notification message may It is practical to derive from believable informed source, so as to which user be caused to miss important notification message.
Step 406, when standard message signature and real messages signature are inconsistent, then the confirmation notification message is generated It is not originating from the second prompt message of the informed source of the message content instruction.
In the specific implementation, the standard message signature and real messages signature when generation are inconsistent, then show the notification message The informed source claimed not is its practical informed source, therefore can generate the second prompt message and return to target customer End, to prompt user that the notification message is insincere.
According to the embodiment of the present application, the of the informed source indicated by generating acknowledgement notification informed source in message content One prompt message so that user can trust the notification message of unknown informed source according to prompt message, and user is avoided to miss weight The notification message wanted.Meanwhile by generate acknowledgement notification message be not originating from message content indicate informed source second Prompt message avoids user from causing any property loss due to forgery, counterfeit informed source.
For the ease of those skilled in the art understand that the embodiment of the present application, below with reference to the tool of Figure 13, Figure 14 and Figure 15 Body example is explained.Figure 13 shows that the destination client of the embodiment of the present application receives the schematic diagram of notification message, from figure As it can be seen that received on the mobile phone of user short message "【Sender】Miss Wang, congratulating you becomes double 11 the 100000000th payment users, Wo Menwei You provide whole year and exempt from list.【Short message verification code】Saitama sucks saliva ".The short message can be copied to informed source verification client by user In, informed source verifies that client searches corresponding public key certificate according to the source identification of " Sender ", and calculates message content “【Sender】Miss Wang, congratulating you becomes double 11 the 100000000th payment users, we provide whole year for you and exempt from list " hashed value, And the hashed value being calculated is compressed into standard message signature " Saitama sucks saliva ", in standard message signature " Saitama sucks saliva " with actually disappearing When breath signature " Saitama sucks saliva " is consistent, then acknowledgement notification informed source indicate in message content informed source, and generation first carries Show that information is shown to user.Figure 14 shows the schematic diagram one of first prompt message of the embodiment of the present application, it can be seen that the One prompt message can include the message content and information signature of the informed source verification result of " verification passes through ", notification message And the source identification of informed source, and the button for providing " checking information signature details " selects displaying verification information for user. Figure 15 shows the schematic diagram two of first prompt message of the embodiment of the present application, it can be seen that when message is checked in user's selection Sign details after, can show informed source verification result, message content, information signature, source identification, Target Public Key certificate, The specific verification informations such as validity period of certificate, certificate issuance platform.
Embodiment five
Fig. 5 shows a kind of step flow chart of message method of the embodiment of the present application five, can specifically include such as Lower step:
Step 501, Target Public Key certificate is obtained according to the informed source marked in message content to be sent.
In practical notification message issues scene, the informed source end for sending a notification message, which can be provided with, to be shown The source identification of informed source, and the source identification is added in the message content issued, so that client is marked according to source Know indicated informed source and obtain corresponding public key certificate.Therefore some notification message is being issued to some destination client When, according to the source identification in message content is marked corresponding Target Public Key certificate can be got from certificate issuance platform. In practical application, Target Public Key certificate can also be pre-stored in informed source end, when needing notification message transmission in local Obtain Target Public Key certificate.
Wherein, informed source end can include instant communication client and, social client, mailbox, short message etc. it is non- Instant communication client.
Step 502, it is signed using the real messages of message content described in Target Public Key certificates constructing.
Step 503, using the message content and real messages signature generation notification message.
Message content to be issued is directed to, the reality of Target Public Key certificates constructing message content may be used in informed source end Message content and real messages signature are generated notification message to issue by border information signature.
Step 504, the notification message is issued, notification message is obtained, and obtaining in the message for verification client Target Public Key certificate used by the informed source of appearance instruction, using the mark of message content described in the Target Public Key certificates constructing Quasi- information signature after judging that the real messages signature of the notification message is consistent with standard message signature, confirms that the notice disappears Breath is from the informed source of message content instruction.
In the specific implementation, notification message can be issued to some destination client.Destination client can include instant Telecommunication customer end and, the non-instant telecommunication customer end of social client, mailbox, short message etc..
The notification message that verification client can be directed to destination client is obtained, and obtains disappearing for message content instruction Target Public Key certificate used by breath source is signed using the standard message of Target Public Key certificates constructing message content, works as judgement After the real messages signature of the notification message is signed unanimously with standard message, confirm that the notification message derives from the message The informed source of content instruction.
Optionally, the message content carries the source identification of informed source, and the step 501 can include following sub-step Suddenly:
Sub-step S9 determines certificate issuance platform used by the informed source according to the source identification.
Sub-step S10, the Target Public Key certificate used by the informed source described in identified certificate issuance platform request.
Informed source end when sending a notification message, can by the source identification corresponding to it be added to message content in Indicate the informed source of the notification message, while the certificate issuance platform for determining to use according to the source identification, and from this Certificate issuance platform obtains corresponding public key certificate.
Optionally, the step 502 can include following sub-step:
Sub-step S11 calculates the hashed value of the message content using the Target Public Key certificate.
The hashed value is compressed into the character string using setting character format, and will compress obtained word by sub-step S12 Symbol string is signed as real messages.
In the specific implementation, Target Public Key certificate may be used, dissipating for the message content is calculated by message digest algorithm Hashed value is compressed into the character string using setting character format, and will compress obtained character string as real messages by train value Signature.For example, using public key certificate will " Miss Wang, congratulating you becomes double 11 the 100000000th payment users, we provide entirely for you Year exempt from list " the real messages signature " Saitama sucks saliva " of generation Chinese character
According to the embodiment of the present application, by the way that the hashed value of message content to be compressed into the character string of setting character, thus will Digital signature is converted into character signature so that information signature is identified and remembered convenient for user.When carrying out informed source verification, use Family can directly input notification message to complete to verify, so that informed source verification, which need not depend on, is stored in target customer Notification message on end, avoid because user accidentally deletes notification message and the problem of can not verifying.Moreover, user can will include The notification message of confidential information is deleted immediately, and confidential information is avoided to reveal, and can be notified when needing verification by typewriting input The mode of message is completed to verify.
Optionally, the character string hashed value being compressed into using setting character format, and will compress what is obtained The step of character string is signed as real messages includes:
The hashed value is compressed into multiple character strings according to different reduced rules;
The target string conduct being made of the conventional characters of the setting character format is filtered out from multiple character strings Real messages are signed.
In the specific implementation, hashed value can be compressed according to multiple reduced rules, it is same to be mapped to Multiple character strings of message content search one or more character strings being made of conventional characters as mesh from multiple character strings Character string is marked, is signed by the target string as real messages.It is signed using conventional characters as real messages, further just It identifies and remembers in user.
According to the embodiment of the present application, obtained by informed source end according to the informed source marked in message content to be sent Target Public Key certificate is taken, is signed using the real messages of message content described in Target Public Key certificates constructing, using in the message Hold and real messages signature generates notification message and issues so that informed source end can send to destination client and can test The notification message of informed source is demonstrate,proved, consequently facilitating the user for receiving notification message verifies informed source.
It secondly, can be by non intelligent, insincere, no during the informed source end notification message transmission of the embodiment of the present application It can verify that the channel in source is sent, while ensureing the integrality of notification message, not changing existing communication system, realize Verification to informed source.The notification message sent with short message mode is directed to, short message mode can be not only maintained and be had Some wide coverages, compatible terminal are more, assign fireballing advantage, and realize the verifiability of informed source.
Again, the embodiment of the present application can be multiplexed existing PKI and RSA (key certificate system) to realize that informed source is tested Card reduces the cost of implementation of informed source verification.
Meanwhile the embodiment of the present application can be applied to various instant communication clients and, it is social client, mailbox, short The non-instant telecommunication customer end of letter etc., it is achieved thereby that the informed source verification between individual subscriber.
Finally, the notification message issued by the embodiment of the present application can meet People's Republic of China's law of electronic signature Regulation ensures that issued notification message has legal effect using cryptography, convenient for user using the notification message of reception as Legal argument.
Embodiment six
Fig. 6 shows a kind of step flow chart of informed source verification method of the embodiment of the present application six, can specifically wrap Include following steps:
Step 601, displaying verification interface, the verification interface include the input frame of notification message.
In the specific implementation, user opens informed source verification client, informed source verification client listens to user It replicates notification message or listens to destination client and newly receive notification message, informed source verification client can provide a user One verification interface, verification interface have the input frame of notification message.In practical application, verify that the displaying opportunity at interface can root Depending on actual needs.
Step 602, the notification message that user inputs in the input frame at the verification interface is received;The notification message packet Include message content and real messages signature.
User can input the notification message received in input frame.The mode of input can be user's leading to duplication Know message paste into input frame in or user using typewriting by the way of the content of notification message is input to input one by one In frame.Informed source verification client can obtain the notification message inputted in input frame, to be verified.
Step 603, Target Public Key certificate used by the informed source of message content instruction is obtained.
Step 604, it is signed using the standard message of message content described in the Target Public Key certificates constructing.
Step 605, judge that the real messages signature of the notification message to be verified is consistent with standard message signature, then really Recognize the informed source that the notification message derives from message content instruction.
Informed source verification client can obtain and correspond to according to the informed source indicated by source identification in message content Target Public Key certificate.Target Public Key certificate may be used in informed source verification client, and a mark is generated for message content Quasi- information signature, informed source verification client may determine that the real messages signature and the one of standard message signature of notification message Cause property can be confirmed that notification message to be verified derives from the informed source of its instruction when consistent.
According to the embodiment of the present application, by showing that verification interface obtains notification message to user, user can directly input Notification message is to complete to verify, so that informed source verification need not disappear dependent on the notice being stored on destination client Breath, avoid because user accidentally deletes notification message and the problem of can not verify.Moreover, user can will be comprising confidential information it is logical Know that message is deleted immediately, confidential information is avoided to reveal, it can be complete by way of typewriting input notification message when needing verification Into verification.
Embodiment seven
Fig. 7 shows a kind of step flow chart of interactive interface providing method of the embodiment of the present application seven, can specifically wrap Include following steps:
Step 701, displaying verification interface, the verification interface include the input frame of notification message.
In the specific implementation, user opens informed source verification client, informed source verification client listens to user It replicates notification message or listens to destination client and newly receive notification message, informed source verification client can provide a user One verification interface, verification interface have the input frame of notification message.In practical application, verify that the displaying opportunity at interface can root Depending on actual needs.
Step 702, the notification message that user inputs in the input frame at the verification interface is received;The notification message packet Include message content and real messages signature.
User can input the notification message received in input frame.The mode of input can be user's leading to duplication Know message paste into input frame in or user using typewriting by the way of the content of notification message is input to input one by one In frame.Informed source verification client can obtain the notification message inputted in input frame, to be verified.
Step 703, Target Public Key certificate used by the informed source of message content instruction is obtained.
Step 704, it is signed using the standard message of message content described in the Target Public Key certificates constructing.
Step 705, judge that the real messages signature of the notification message to be verified is consistent with standard message signature, then really Recognize the informed source that the notification message derives from message content instruction.
Informed source verification client can obtain and correspond to according to the informed source indicated by source identification in message content Target Public Key certificate.Target Public Key certificate may be used in informed source verification client, and a mark is generated for message content Quasi- information signature, informed source verification client may determine that the real messages signature and the one of standard message signature of notification message Cause property can be confirmed that notification message to be verified derives from the informed source of its instruction when consistent.
Step 706, in verification the first prompt message of showing interface, first prompt message is used to confirm that the notice disappears Breath is from the informed source of message content instruction.
In the specific implementation, when the informed source that acknowledgement notification informed source is indicated in message content, can generate corresponding First prompt message can return to first prompt message to destination client, be shown from destination client to user.Wherein, First prompt message can include informed source verification result, message content, information signature, source identification, Target Public Key certificate, One or more information in validity period of certificate, certificate issuance platform.In practical application, can prompt message institute be selected by user The particular content of displaying, for example, the button for providing a detailed verification information of displaying is clicked for user, when user clicks the button Detailed verification information is then shown afterwards.
In practical application, user may and distrust the notification message of unknown informed source, however the notification message may It is practical to derive from believable informed source, so as to which user be caused to miss important notification message.
According to the embodiment of the present application, by verifying the first prompt message of showing interface, it will confirm that notification message derives from The information of the informed source of message content instruction is supplied to user, and user is avoided to have ignored and comes from unknown informed source but reality Upper notification message trusty.
It should be noted that for embodiment of the method, in order to be briefly described, therefore it is all expressed as to a series of action group It closes, but those skilled in the art should know, the embodiment of the present application is not limited by described sequence of movement, because according to According to the embodiment of the present application, certain steps may be used other sequences or be carried out at the same time.Secondly, those skilled in the art also should Know, embodiment described in this description belongs to preferred embodiment, and involved action not necessarily the application is implemented Necessary to example.
Embodiment eight
Fig. 8 shows a kind of structure diagram of informed source verification device of the embodiment of the present application eight, can specifically include Following module:
Notification message acquisition module 801, for obtaining notification message to be verified;The notification message includes message content It signs with real messages.
Target Public Key certificate acquisition module 802, for obtaining the informed source of message content instruction used by mesh Mark public key certificate.
Standard message signature generation module 803, for using the mark of message content described in the Target Public Key certificates constructing Quasi- information signature.
Determination module 804, for judging that the real messages of the notification message to be verified signature and standard message are signed Unanimously, then confirm that the notification message derives from the informed source of message content instruction.
According to the embodiment of the present application, the message indicated by message content in the notification message received for destination client Source obtains Target Public Key certificate, is signed according to Target Public Key certificates constructing standard message, passes through standard message signature and reality Whether the consistency acknowledgement notification message of information signature puts up a notice from the informed source indicated by message content so as to identify The credibility of the informed source of message is reduced and is caused any property loss due to user is difficult to forgery, counterfeit informed source Risk.
Embodiment nine
Fig. 9 shows a kind of structure diagram of informed source verification device of the embodiment of the present application nine, can specifically include Following module:
Notification message acquisition module 901, for obtaining notification message to be verified;The notification message includes message content It signs with real messages.
Target Public Key certificate acquisition module 902, for obtaining the informed source of message content instruction used by mesh Mark public key certificate.
Standard message signature generation module 903, for using the mark of message content described in the Target Public Key certificates constructing Quasi- information signature.
Determination module 904, for judging that the real messages of the notification message to be verified signature and standard message are signed Unanimously, then confirm that the notification message derives from the informed source of message content instruction.
First prompt message generation module 905 confirms that the notification message refers to from the message content for generating First prompt message of the informed source shown.
Second prompt message generation module 906, it is inconsistent for working as the standard message signature and real messages signature, then Generation confirms that the notification message is not originating from the second prompt message of the informed source of the message content instruction.
Optionally, the message content can carry the source identification of informed source, the Target Public Key certificate acquisition mould Block 902 can include following submodule:
Source identification extracting sub-module, for extracting the source identification of informed source from the message content;
Target Public Key certificate lookup submodule, for according to the source identification, searching the mesh that the informed source uses Mark public key certificate.
Optionally, the Target Public Key certificate lookup submodule can include following subelement:
Certificate issuance platform determination subelement, for determining the informed source according to the source identification used by demonstrate,prove Bookmark sends out platform;
Target Public Key certificate request subelement, for being adopted from informed source described in identified certificate issuance platform request Target Public Key certificate.
Optionally, the Target Public Key certificate lookup submodule can include following subelement:
Public key certificate searches subelement, in the multiple public key certificate to prestore, lookup to be matched with the source identification Public key certificate as Target Public Key certificate.
Optionally, the standard message signature generation module 903 can include following submodule:
First hashed value computational submodule, for calculating the hash of the message content using the Target Public Key certificate Value;
First hashed value compresses submodule, for the hashed value to be compressed into the character string using setting character format, And it signs obtained character string is compressed as standard message.
Optionally, the first hashed value compression submodule can include following subelement:
First hashed value compresses subelement, for the hashed value to be compressed into multiple characters according to different reduced rules String;
First conventional characters screen subelement, for being filtered out from multiple character strings by the normal of the setting character format It signs by the use of the target string that character forms as standard message.
Optionally, the notification message acquisition module 901 can include following submodule:
Submodule is monitored in setting position, for monitoring setting position with the presence or absence of newly added notification message;The setting Position includes the memory space for the duplication object for replicating operation;
Notification message extracting sub-module, if for there are the notification messages added in set period of time, it is empty from the storage Between extract the notification message.
Optionally, submodule is monitored in the setting position can include following subelement:
Data content monitors subelement, for monitoring the data content newly replicated in the memory space;
Data content identification subelement identifies that the data content meets setting message format or including setting for passing through Keyword judges the data content for notification message.
Optionally, the notification message acquisition module 901 can include following submodule:
Submodule is monitored in destination client, for monitoring the notification message of destination client reception, the destination client Including instant communication client, non-instant telecommunication customer end, the non-instant telecommunication customer end include social client, mailbox or Short message.
Optionally, described device can further include:
Notification message determination module, for judging that the notification message listened to meets setting message format or including setting pass Keyword.
Optionally, described device can further include:
Snoop-operations trigger module, for triggering snoop-operations according to user behavior, the user behavior is included by setting Stationary interface opens monitor function or opens client residing for snoop-operations.
Optionally, described device can further include:
Showing interface module verifies interface for showing, the verification interface includes the input frame of notification message;
The notification message acquisition module 901 can include following submodule:
Notification message receiving submodule disappears for receiving the notice that user inputs in the input frame at the verification interface Breath.
Optionally, first prompt message includes following at least one:Informed source verification result, disappears at message content Cease signature, source identification, Target Public Key certificate, validity period of certificate, certificate issuance platform.
Optionally, described device can further include:
Corresponding memory module, for carrying out corresponding deposit with the source identification of the informed source to the Target Public Key certificate Storage.
According to the embodiment of the present application, by the way that the public key certificate for corresponding to multiple informed sources is pre-stored in local so that When carrying out informed source verification for notification message, information exchange is carried out without with outside, is completed in destination client whole A verification process realizes the off-line verification to informed source.Pay no attention to so as to avoid because of no network connection or network speed The problem of informed source verification can not be carried out in the case of thinking, improves the flexibility of informed source verification.
According to the embodiment of the present application, the of the informed source indicated by generating acknowledgement notification informed source in message content One prompt message so that user can trust the notification message of unknown informed source according to prompt message, and user is avoided to miss weight The notification message wanted.Meanwhile by generate acknowledgement notification message be not originating from message content indicate informed source second Prompt message avoids user from causing any property loss due to forgery, counterfeit informed source.
Embodiment ten
Figure 10 shows a kind of structure diagram of message sending device of the embodiment of the present application ten, can specifically include as follows Module:
Target Public Key certificate acquisition module 1001, for being obtained according to the informed source marked in message content to be sent Target Public Key certificate.
Real messages signature generation module 1002, for actually disappearing using message content described in Target Public Key certificates constructing Breath signature.
Notification message generation module 1003, for being disappeared using the message content and real messages signature generation notice Breath.
Notification message sending module 1004 for issuing the notification message, is obtained for informed source verification client Notification message, and the Target Public Key certificate used by the informed source for obtaining the message content instruction are taken, using the mesh The standard message signature that public key certificate generates the message content is marked, judges the real messages signature and standard of the notification message After information signature is consistent, confirm that the notification message derives from the informed source of message content instruction.
Optionally, the message content can carry the source identification of informed source, the Target Public Key certificate acquisition mould Block 1001 can include following submodule:
Certificate issuance platform determination sub-module, for determining the informed source according to the source identification used by demonstrate,prove Bookmark sends out platform.
Target Public Key certificate request submodule, for being adopted from informed source described in identified certificate issuance platform request Target Public Key certificate.
Optionally, the real messages signature generation module 1002 can include following submodule:
Second hashed value computational submodule, for calculating the hash of the message content using the Target Public Key certificate Value.
Second hashed value compresses submodule, for the hashed value to be compressed into the character string using setting character format, And it signs obtained character string is compressed as real messages.
Optionally, the second hashed value compression submodule can include following subelement:
Second hashed value compresses subelement, for the hashed value to be compressed into multiple characters according to different reduced rules String;
Second conventional characters screen subelement, for being filtered out from multiple character strings by the normal of the setting character format It signs by the use of the target string that character forms as real messages.
According to the embodiment of the present application, by the way that the hashed value of message content to be compressed into the character string of setting character, thus will Digital signature is converted into character signature so that information signature is identified and remembered convenient for user.When carrying out informed source verification, use Family can directly input notification message to complete to verify, so that informed source verification, which need not depend on, is stored in target customer Notification message on end, avoid because user accidentally deletes notification message and the problem of can not verifying.Moreover, user can will include The notification message of confidential information is deleted immediately, and confidential information is avoided to reveal, and can be notified when needing verification by typewriting input The mode of message is completed to verify.
According to the embodiment of the present application, obtained by informed source end according to the informed source marked in message content to be sent Target Public Key certificate is taken, is signed using the real messages of message content described in Target Public Key certificates constructing, using in the message Hold and real messages signature generates notification message and issues so that informed source end can send to destination client and can test The notification message of informed source is demonstrate,proved, consequently facilitating the user for receiving notification message verifies informed source.
It secondly, can be by non intelligent, insincere, no during the informed source end notification message transmission of the embodiment of the present application It can verify that the channel in source is sent, while ensureing the integrality of notification message, not changing existing communication system, realize Verification to informed source.The notification message sent with short message mode is directed to, short message mode can be not only maintained and be had Some wide coverages, compatible terminal are more, assign fireballing advantage, and realize the verifiability of informed source.
Again, the embodiment of the present application can be multiplexed existing PKI and RSA (key certificate system) to realize that informed source is tested Card reduces the cost of implementation of informed source verification.
Meanwhile the embodiment of the present application can be applied to various instant communication clients and, it is social client, mailbox, short The non-instant telecommunication customer end of letter etc., it is achieved thereby that the informed source verification between individual subscriber.
Finally, the notification message issued by the embodiment of the present application can meet People's Republic of China's law of electronic signature Regulation ensures that issued notification message has legal effect using cryptography, convenient for user using the notification message of reception as Legal argument.
For device embodiment, since it is basicly similar to embodiment of the method, so description is fairly simple, it is related Part illustrates referring to the part of embodiment of the method.
Embodiment 11
Figure 11 shows a kind of structure diagram of informed source verification device of the embodiment of the present application 11, can specifically wrap Include following module:
Showing interface module 1101 verifies interface for showing, the verification interface includes the input frame of notification message.
Notification message receiving module 1102 disappears for receiving the notice that user inputs in the input frame at the verification interface Breath;The notification message includes message content and real messages are signed.
Target Public Key certificate acquisition module 1103, for obtaining the informed source of message content instruction used by mesh Mark public key certificate.
Standard message signature generation module 1104, for using the mark of message content described in the Target Public Key certificates constructing Quasi- information signature.
Determination module 1105, for judging that the real messages of the notification message to be verified signature and standard message are signed Unanimously, then confirm that the notification message derives from the informed source of message content instruction.
According to the embodiment of the present application, by showing that verification interface obtains notification message to user, user can directly input Notification message is to complete to verify, so that informed source verification need not disappear dependent on the notice being stored on destination client Breath, avoid because user accidentally deletes notification message and the problem of can not verify.Moreover, user can will be comprising confidential information it is logical Know that message is deleted immediately, confidential information is avoided to reveal, it can be complete by way of typewriting input notification message when needing verification Into verification.
Embodiment 12
The embodiment of the present application 12 additionally provides a kind of interactive device, can specifically include:
Verify interface, input control and displaying control;
Wherein, for the displaying control for showing verification interface, the verification interface includes input control;
The input control is used to receive notification message input by user;The notification message includes message content and reality Information signature;
The interactive device is used for the Target Public Key certificate obtained according to the informed source that the message content indicates, Generate the standard message signature of the message content;And in the real messages signature and mark for judging the notification message to be verified When quasi- information signature is consistent, the first prompt message is generated;
The displaying control is additionally operable in verification the first prompt message of showing interface, and first prompt message is used to confirm The notification message derives from the informed source of message content instruction.
According to the embodiment of the present application, by verifying the first prompt message of showing interface, it will confirm that notification message derives from The information of the informed source of message content instruction is supplied to user, and user is avoided to have ignored and comes from unknown informed source but reality Upper notification message trusty.
Embodiment 13
Figure 12 shows a kind of structure diagram of informed source verification system of the embodiment of the present application, can specifically include disappearing Cease source-verify client 1201 and certificate issuance platform 1202;
The informed source verification client 1201 can include:
Notification message acquisition module 12011, for obtaining notification message to be verified;The notification message is included in message Hold and real messages are signed.
First object public key certificate acquisition module 12012, the informed source for obtaining the message content instruction are adopted Target Public Key certificate.
Standard message signature generation module 12013, for using message content described in the Target Public Key certificates constructing Standard message is signed.
Determination module 12014, for judging the real messages of the notification message to be verified signature and standard message label Name is consistent, then confirms that the notification message derives from the informed source of message content instruction.
The certificate issuance platform 1202 can include:
First object public key certificate sending module 12021, it is public for sending target to informed source verification client Key certificate.
Optionally, the system can further include:Destination client 1203;The destination client 1203 can be included i.e. When telecommunication customer end, non-instant telecommunication customer end, the non-instant telecommunication customer end include social client, mailbox or short message;
The destination client 1203 can include:
Notification message receiving module 12031, for receiving notification message;
The notification message acquisition module 12011, the notification message received specifically for monitoring destination client.
Optionally, the system can further include:Informed source end 1204;
The informed source end 1204 includes:
Second Target Public Key certificate acquisition module 12041, for according to the message marked in message content to be sent come Source obtains Target Public Key certificate;
Real messages signature generation module 12042, for using the reality of message content described in Target Public Key certificates constructing Information signature;
Notification message generation module 12043, for using the message content and real messages signature generation notice Message;
Notification message sending module 12044 for issuing the notification message, is obtained for informed source verification client Notification message, and the Target Public Key certificate used by the informed source for obtaining the message content instruction are taken, using the mesh The standard message signature that public key certificate generates the message content is marked, judges the real messages signature and standard of the notification message After information signature is consistent, confirm that the notification message derives from the informed source of message content instruction;
The certificate issuance platform 1202 can further include:
Second Target Public Key certificate sending module 12022, for sending Target Public Key certificate to the informed source end.
According to the embodiment of the present application, the message indicated by message content in the notification message received for destination client Source obtains Target Public Key certificate, is signed according to Target Public Key certificates constructing standard message, passes through standard message signature and reality Whether the consistency acknowledgement notification message of information signature puts up a notice from the informed source indicated by message content so as to identify The credibility of the informed source of message is reduced and is caused any property loss due to user is difficult to forgery, counterfeit informed source Risk.
For system embodiment, since it is basicly similar to embodiment of the method, so description is fairly simple, it is related Part illustrates referring to the part of embodiment of the method.
Each embodiment in this specification is described by the way of progressive, the highlights of each of the examples are with The difference of other embodiment, just to refer each other for identical similar part between each embodiment.
It should be understood by those skilled in the art that, the embodiment of the embodiment of the present application can be provided as method, apparatus or calculate Machine program product.Therefore, the embodiment of the present application can be used complete hardware embodiment, complete software embodiment or combine software and The form of the embodiment of hardware aspect.Moreover, the embodiment of the present application can be used one or more wherein include computer can With in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code The form of the computer program product of implementation.
In a typical configuration, the computer equipment includes one or more processors (CPU), input/output Interface, network interface and memory.Memory may include the volatile memory in computer-readable medium, random access memory The forms such as device (RAM) and/or Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is to calculate The example of machine readable medium.Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be with Realize that information stores by any method or technique.Information can be computer-readable instruction, data structure, the module of program or Other data.The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), fast flash memory bank or other memory techniques, CD-ROM are read-only Memory (CD-ROM), digital versatile disc (DVD) or other optical storages, magnetic tape cassette, tape magnetic rigid disk storage or Other magnetic storage apparatus or any other non-transmission medium, available for storing the information that can be accessed by a computing device.According to Herein defines, and computer-readable medium does not include the computer readable media (transitory media) of non-standing, such as The data-signal and carrier wave of modulation.
The embodiment of the present application is with reference to according to the method for the embodiment of the present application, terminal device (system) and computer program The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions In each flow and/or block and flowchart and/or the block diagram in flow and/or box combination.These can be provided Computer program instructions are set to all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals Standby processor is to generate a machine so that is held by the processor of computer or other programmable data processing terminal equipments Capable instruction generation is used to implement in one flow of flow chart or multiple flows and/or one box of block diagram or multiple boxes The device for the function of specifying.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing terminal equipments In the computer-readable memory to work in a specific way so that the instruction being stored in the computer-readable memory generates packet The manufacture of command device is included, which realizes in one flow of flow chart or multiple flows and/or one side of block diagram The function of being specified in frame or multiple boxes.
These computer program instructions can be also loaded into computer or other programmable data processing terminal equipments so that Series of operation steps are performed on computer or other programmable terminal equipments to generate computer implemented processing, thus The instruction offer performed on computer or other programmable terminal equipments is used to implement in one flow of flow chart or multiple flows And/or specified in one box of block diagram or multiple boxes function the step of.
Although the preferred embodiment of the embodiment of the present application has been described, those skilled in the art once know base This creative concept can then make these embodiments other change and modification.So appended claims are intended to be construed to Including preferred embodiment and fall into all change and modification of the embodiment of the present application range.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, term " comprising ", "comprising" or its any other variant meaning Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements are not only wrapped Those elements are included, but also including other elements that are not explicitly listed or are further included as this process, method, article Or the element that terminal device is intrinsic.In the absence of more restrictions, it is wanted by what sentence "including a ..." limited Element, it is not excluded that also there are other identical elements in the process including the element, method, article or terminal device.
Above to a kind of informed source verification method provided herein and a kind of informed source verification device and, A kind of message method and a kind of message sending device and a kind of informed source verification system, are described in detail, this Specific case is applied in text, and the principle and implementation of this application are described, the explanation of above example is only intended to Help understands the present processes and its core concept;Meanwhile for those of ordinary skill in the art, the think of according to the application Think, in specific embodiments and applications there will be changes, in conclusion the content of the present specification should not be construed as pair The limitation of the application.

Claims (29)

1. a kind of informed source verification method, which is characterized in that the method includes:
Obtain notification message to be verified;The notification message includes message content and real messages are signed;
Obtain Target Public Key certificate used by the informed source of message content instruction;
It is signed using the standard message of message content described in the Target Public Key certificates constructing;
Judge that the real messages signature of the notification message to be verified is consistent with standard message signature, then confirm that the notice disappears Breath is from the informed source of message content instruction.
2. according to the method described in claim 1, it is characterized in that, the message content carry informed source source identification, Include the step of Target Public Key certificate used by the informed source for obtaining the message content instruction:
The source identification of informed source is extracted from the message content;
According to the source identification, the Target Public Key certificate that the informed source uses is searched.
3. according to the method described in claim 2, it is characterized in that, described according to the source identification, the message is searched The step of Target Public Key certificate that source uses, includes:
Certificate issuance platform used by the informed source is determined according to the source identification;
The Target Public Key certificate used by the informed source described in identified certificate issuance platform request.
4. according to the method described in claim 2, it is characterized in that, described according to the source identification, the message is searched The step of Target Public Key certificate that source uses, includes:
In the multiple public key certificate to prestore, the public key certificate for being matched with the source identification is searched as Target Public Key certificate.
It is 5. according to the method described in claim 1, it is characterized in that, described using message described in the Target Public Key certificates constructing The step of standard message signature of content, includes:
The hashed value of the message content is calculated using the Target Public Key certificate;
The hashed value is compressed into the character string using setting character format, and disappear obtained character string is compressed as standard Breath signature.
6. according to the method described in claim 5, it is characterized in that, described be compressed into the hashed value using setting character lattice The character string of formula, and include the step of obtained character string is signed as standard message is compressed:
The hashed value is compressed into multiple character strings according to different reduced rules;
The target string being made of the conventional characters of the setting character format is filtered out from multiple character strings as standard Information signature.
7. according to the method described in claim 1, it is characterized in that, described the step of obtaining notification message to be verified include:
It monitors setting position and whether there is newly added notification message;The setting position is included for the duplication pair for replicating operation The memory space of elephant;
If there are the notification message added in set period of time, the notification message is extracted from the memory space.
8. the method according to the description of claim 7 is characterized in that the monitoring setting position whether there is newly added notice The step of message, includes:
Monitor the data content newly replicated in the memory space;
By identifying that the data content meets setting message format or including setting keyword, it is logical to judge the data content Know message.
9. according to the method described in claim 1, it is characterized in that, described the step of obtaining notification message to be verified include:
The notification message that destination client receives is monitored, the destination client includes instant communication client, non-instant communication Client, the non-instant telecommunication customer end include social client, mailbox or short message.
10. according to the method described in claim 9, it is characterized in that, the method further includes:
Judge that the notification message listened to meets setting message format or including setting keyword.
11. the method according to the description of claim 7 is characterized in that in the monitoring setting position with the presence or absence of newly added Before the step of notification message, the method further includes:
Snoop-operations are triggered according to user behavior, the user behavior includes opening monitor function or unlatching by setting interface Client residing for snoop-operations.
12. according to the method described in claim 1, it is characterized in that, described the step of obtaining notification message to be verified it Before, the method further includes:
Displaying verification interface, the verification interface include the input frame of notification message;
Described the step of obtaining notification message to be verified, includes:
Receive the notification message that user inputs in the input frame at the verification interface.
13. according to the method described in claim 1, it is characterized in that, the method further includes:
Generation confirms first prompt message of the notification message from the informed source of message content instruction.
14. according to the method for claim 13, which is characterized in that first prompt message includes following at least one: Informed source verification result, message content, information signature, source identification, Target Public Key certificate, validity period of certificate, certificate issuance Platform.
15. according to the method described in claim 1, it is characterized in that, the method further includes:
When standard message signature and real messages signature are inconsistent, then generate the confirmation notification message and be not originating from institute State the second prompt message of the informed source of message content instruction.
16. according to the method described in claim 2, it is characterized in that, the method further includes:
Corresponding storage is carried out with the source identification of the informed source to the Target Public Key certificate.
17. a kind of message method, which is characterized in that the method includes:
Target Public Key certificate is obtained according to the informed source marked in message content to be sent;
It is signed using the real messages of message content described in Target Public Key certificates constructing;
Using the message content and real messages signature generation notification message;
The notification message is issued, notification message is obtained, and refer to obtaining the message content for informed source verification client Target Public Key certificate used by the informed source shown, the standard using message content described in the Target Public Key certificates constructing disappear Breath signature after judging that the real messages signature of the notification message is consistent with standard message signature, confirms that the notification message comes Derived from the informed source of message content instruction.
18. according to the method for claim 17, which is characterized in that the message content carries the source mark of informed source Know, described the step of obtaining Target Public Key certificate according to the informed source marked in message content to be sent includes:
Certificate issuance platform used by the informed source is determined according to the source identification;
The Target Public Key certificate used by the informed source described in identified certificate issuance platform request.
19. according to the method for claim 17, which is characterized in that described using in message described in Target Public Key certificates constructing The step of real messages signature of appearance, includes:
The hashed value of the message content is calculated using the Target Public Key certificate;
The hashed value is compressed into the character string using setting character format, and obtained character string will be compressed as actually disappearing Breath signature.
20. according to the method for claim 19, which is characterized in that described that the hashed value is compressed into using setting character The character string of form, and include the step of obtained character string is signed as real messages is compressed:
The hashed value is compressed into multiple character strings according to different reduced rules;
The target string being made of the conventional characters of the setting character format is filtered out from multiple character strings as practical Information signature.
21. a kind of informed source verification method, which is characterized in that the method includes:
Displaying verification interface, the verification interface include the input frame of notification message;
Receive the notification message that user inputs in the input frame at the verification interface;The notification message include message content and Real messages are signed;
Obtain Target Public Key certificate used by the informed source of message content instruction;
It is signed using the standard message of message content described in the Target Public Key certificates constructing;
Judge that the real messages signature of the notification message to be verified is consistent with standard message signature, then confirm that the notice disappears Breath is from the informed source of message content instruction.
22. a kind of interactive interface providing method, which is characterized in that the method includes:
Displaying verification interface, the verification interface include the input frame of notification message;
Receive the notification message that user inputs in the input frame at the verification interface;The notification message include message content and Real messages are signed;
Obtain Target Public Key certificate used by the informed source of message content instruction;
It is signed using the standard message of message content described in the Target Public Key certificates constructing;
Judge that the real messages signature of the notification message to be verified is consistent with standard message signature, then confirm that the notice disappears Breath is from the informed source of message content instruction;
In verification the first prompt message of showing interface, first prompt message is used to confirm the notification message from described The informed source of message content instruction.
23. a kind of informed source verifies device, which is characterized in that described device includes:
Notification message acquisition module, for obtaining notification message to be verified;The notification message includes message content and reality Information signature;
Target Public Key certificate acquisition module, for obtaining the informed source of message content instruction used by Target Public Key demonstrate,prove Book;
Standard message signature generation module, for using the standard message label of message content described in the Target Public Key certificates constructing Name;
Determination module, for judging that the real messages of the notification message to be verified signature is consistent with standard message signature, then Confirm that the notification message derives from the informed source of message content instruction.
24. a kind of message sending device, which is characterized in that described device includes:
Target Public Key certificate acquisition module, for obtaining Target Public Key according to the informed source marked in message content to be sent Certificate;
Real messages signature generation module, for using the real messages of message content described in Target Public Key certificates constructing signature;
Notification message generation module, for using the message content and real messages signature generation notification message;
Notification message sending module for issuing the notification message, obtains notice for informed source verification client and disappears Breath, and the Target Public Key certificate used by the informed source for obtaining the message content instruction, are demonstrate,proved using the Target Public Key The standard message of inteilectual into the message content is signed, and judges that the real messages signature of the notification message is signed with standard message After consistent, confirm that the notification message derives from the informed source of message content instruction.
25. a kind of informed source verifies device, which is characterized in that described device includes:
Showing interface module verifies interface for showing, the verification interface includes the input frame of notification message;
Notification message receiving module, for receiving the notification message that user inputs in the input frame at the verification interface;It is described Notification message includes message content and real messages are signed;
Target Public Key certificate acquisition module, for obtaining the informed source of message content instruction used by Target Public Key demonstrate,prove Book;
Standard message signature generation module, for using the standard message label of message content described in the Target Public Key certificates constructing Name;
Determination module, for judging that the real messages of the notification message to be verified signature is consistent with standard message signature, then Confirm that the notification message derives from the informed source of message content instruction.
26. a kind of interactive device, which is characterized in that including:
Verify interface, input control and displaying control;
Wherein, for the displaying control for showing verification interface, the verification interface includes input control;
The input control is used to receive notification message input by user;The notification message includes message content and real messages Signature;
The interactive device is used for the Target Public Key certificate obtained according to the informed source that the message content indicates, generation The standard message signature of the message content;And it signs in the real messages for judging the notification message to be verified and disappears with standard When breath signature is consistent, the first prompt message is generated;
The displaying control is additionally operable in verification the first prompt message of showing interface, and first prompt message is used to confirm described Notification message derives from the informed source of message content instruction.
27. a kind of informed source verifies system, which is characterized in that the system comprises informed source verification client and certificate label Send out platform;
The informed source verification client includes:
Notification message acquisition module, for obtaining notification message to be verified;The notification message includes message content and reality Information signature;
First object public key certificate acquisition module, for obtaining the informed source of message content instruction used by target it is public Key certificate;
Standard message signature generation module, for using the standard message label of message content described in the Target Public Key certificates constructing Name;
Determination module, for judging that the real messages of the notification message to be verified signature is consistent with standard message signature, then Confirm that the notification message derives from the informed source of message content instruction;
The certificate issuance platform includes:
First object public key certificate sending module, for sending Target Public Key certificate to informed source verification client.
28. system according to claim 27, which is characterized in that the system also includes:Destination client;The target Client include instant communication client, non-instant telecommunication customer end, the non-instant telecommunication customer end include social client, Mailbox or short message;
The destination client includes:
Notification message receiving module, for receiving notification message;
The notification message acquisition module, the notification message received specifically for monitoring destination client.
29. system according to claim 27, which is characterized in that the system also includes:Informed source end;
The informed source end includes:
Second Target Public Key certificate acquisition module, for obtaining target according to the informed source marked in message content to be sent Public key certificate;
Real messages signature generation module, for using the real messages of message content described in Target Public Key certificates constructing signature;
Notification message generation module, for using the message content and real messages signature generation notification message;
Notification message sending module for issuing the notification message, obtains notice for informed source verification client and disappears Breath, and the Target Public Key certificate used by the informed source for obtaining the message content instruction, are demonstrate,proved using the Target Public Key The standard message of inteilectual into the message content is signed, and judges that the real messages signature of the notification message is signed with standard message After consistent, confirm that the notification message derives from the informed source of message content instruction;
The certificate issuance platform further includes:
Second Target Public Key certificate sending module, for sending Target Public Key certificate to the informed source end.
CN201611261592.8A 2016-12-30 2016-12-30 Message source verification method, device and system and message sending method and device Active CN108270567B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611261592.8A CN108270567B (en) 2016-12-30 2016-12-30 Message source verification method, device and system and message sending method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611261592.8A CN108270567B (en) 2016-12-30 2016-12-30 Message source verification method, device and system and message sending method and device

Publications (2)

Publication Number Publication Date
CN108270567A true CN108270567A (en) 2018-07-10
CN108270567B CN108270567B (en) 2021-09-28

Family

ID=62754955

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611261592.8A Active CN108270567B (en) 2016-12-30 2016-12-30 Message source verification method, device and system and message sending method and device

Country Status (1)

Country Link
CN (1) CN108270567B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111970407A (en) * 2020-08-28 2020-11-20 深圳鑫想科技有限责任公司 Method and system for effectively preventing telecommunication fraud

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060230272A1 (en) * 2005-03-30 2006-10-12 Microsoft Corporation Validating the origin of web content
CN101174945A (en) * 2006-10-31 2008-05-07 中兴通讯股份有限公司 Method for validating PUSH message and identity of its transmission part
CN101399838A (en) * 2008-10-29 2009-04-01 成都市华为赛门铁克科技有限公司 Method, apparatus and system for processing packet
US20100070761A1 (en) * 2008-09-17 2010-03-18 Alcatel-Lucent Reliable authentication of message sender's identity
CN102469173A (en) * 2010-11-15 2012-05-23 中国人民解放军总参谋部第六十一研究所 IPv6 (Internet Protocol Version 6) network layer credible transmission method and system based on combined public key algorithm
CN106060000A (en) * 2016-05-06 2016-10-26 青岛海信移动通信技术股份有限公司 Method and device of identifying verification information
CN106131804A (en) * 2016-06-21 2016-11-16 广东欧珀移动通信有限公司 A kind of notification message processing method and equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060230272A1 (en) * 2005-03-30 2006-10-12 Microsoft Corporation Validating the origin of web content
CN101174945A (en) * 2006-10-31 2008-05-07 中兴通讯股份有限公司 Method for validating PUSH message and identity of its transmission part
US20100070761A1 (en) * 2008-09-17 2010-03-18 Alcatel-Lucent Reliable authentication of message sender's identity
CN101399838A (en) * 2008-10-29 2009-04-01 成都市华为赛门铁克科技有限公司 Method, apparatus and system for processing packet
CN102469173A (en) * 2010-11-15 2012-05-23 中国人民解放军总参谋部第六十一研究所 IPv6 (Internet Protocol Version 6) network layer credible transmission method and system based on combined public key algorithm
CN106060000A (en) * 2016-05-06 2016-10-26 青岛海信移动通信技术股份有限公司 Method and device of identifying verification information
CN106131804A (en) * 2016-06-21 2016-11-16 广东欧珀移动通信有限公司 A kind of notification message processing method and equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111970407A (en) * 2020-08-28 2020-11-20 深圳鑫想科技有限责任公司 Method and system for effectively preventing telecommunication fraud

Also Published As

Publication number Publication date
CN108270567B (en) 2021-09-28

Similar Documents

Publication Publication Date Title
US10244105B2 (en) Methods and systems for real time display of caller location, profile, and trust relationship
KR101130405B1 (en) Method and system for identity recognition
US11153435B2 (en) Method and system for automatically blocking robocalls
US10805458B1 (en) Method and system for automatically blocking recorded robocalls
US20050114447A1 (en) Method and system for identity exchange and recognition for groups and group members
CN105207780B (en) A kind of certification user method and device
CN110266872B (en) Address book data management and control method and device, cloud address book system, computer equipment and computer readable storage medium
CA2831527C (en) Computer-implemented system and method for validating call connections
CN112422751B (en) Calling method and system for displaying calling party multimedia identity based on called party
US11483428B2 (en) Method and system for automatically detecting and blocking robocalls
CN108718323A (en) A kind of identity identifying method and system
GB2456742A (en) Determining trust levels for data sources
US20200014543A1 (en) Identity authentication
CN113129008A (en) Data processing method and device, computer readable medium and electronic equipment
CN108270567A (en) Informed source verification method, device and system and message method and device
CN114444091A (en) CDN-based anti-theft chain customization system, method and storage medium
EP3151519B1 (en) An intelligent system of unified content posting
KR20140099389A (en) System for detecting and preventing a phishing message of banking and method for detecting and preventing a phishing message of banking thereof
EP2204030B1 (en) Transmission of messages
US20060167799A1 (en) Client-server-type security system, such as a security system for use with computer network consumer transactions
TW201246900A (en) Method and system capable of verifying network-dialing caller ID and detecting malicious network call
CN105991523A (en) Method of generating electronic protocol authenticated by user of telecom operator
CN117235806A (en) Data interface authentication method and device
CN116094718A (en) Data transmission method and device, electronic equipment and storage medium
CN116702119A (en) Information verification display method, device, system, equipment and readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant